Overview
FrançaisRead this article from a comprehensive knowledge base, updated and supplemented with articles reviewed by scientific committees.
Read the articleAUTHOR
-
Michel CHOCHOIS: Senior Manager Security and Privacy – Deloitte SA (Switzerland)
INTRODUCTION
Smartphones have rapidly become an integral part of our daily lives, as well as a vital tool in our business communications. Originally, these devices suffered from a lack of autonomy and complexity. Security aspects were relegated to the background. Since the arrival of the latest generation of iPhone, Android and Symbian devices, functionality has been combined with a "usability" adapted to the demands of both regular and professional users.
Intrinsically, smartphones have become more autonomous thanks to an increasingly integrated architecture. They have moved away from PC models, using both low-power and highly integrated processors.
The technological turning point was the use of ARM-type processors, based on reduced instruction set architectures (RISC), reducing the number of transistors, optimizing the architecture and thus lowering power consumption. Their architecture calls for greater integration of components, and the use of controllers dedicated to functions directly managed by hardware components, limiting software interpretation.
Using ARM or Qualcomm processors, the heart of a smartphone consists of a SOC (System On Chip), based on a processor, and various components such as the DSP (Digital Signal Processor) for 3G frequency band processing, as well as signal and image processing. In addition, graphics components such as the graphics gas pedal enable the decoding of various video formats and the invocation of the GPS geolocation component.
These peripheral components consume a lot of energy, especially data transmission and reception via 3G-type networks. Today, manufacturers are implementing optimization software stacks to make the smartphone more autonomous than the 2 or 3 hours observed.
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
The Ultimate Scientific and Technical Reference
This article is included in
Security of information systems
This offer includes:
Knowledge Base
Updated and enriched with articles validated by our scientific committees
Services
A set of exclusive tools to complement the resources
Practical Path
Operational and didactic, to guarantee the acquisition of transversal skills
Doc & Quiz
Interactive articles with quizzes, for constructive reading
Smartphones Android, iOS Apple
Bibliography
Also in our database
Websites
• Symantec finds big differences in iOS, Android security (John Cox, Network world June 2011) http://www.networkworld.com/news/2011/062811-symantec-mobile-report.html
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
The Ultimate Scientific and Technical Reference